How does the Tor network hide your traffic?

preview_player
Показать описание
The Onion Router (Tor) creates a network for encrypting data traffic. Using a Tor browser, you can hide your identity, your location, the websites you visit, and some other browsing activities. Today I will demonstrate how the Tor network works.
Playlists:
Privacy Enhanced Technologies
Business continuity
Cyber Attacks and Defense
Basic Cryptography
Advanced Cryptography:
Public Key Infrastructure

Remote Access & WAN Technologies
Рекомендации по теме
Комментарии
Автор

Extremely well explained. One of the best I’ve seen.

billvvoods
Автор

Awesome animations! they help a lot. Thank you for these videos Sunny!

emanueler
Автор

Thanks a lot for these crystal clear explanations. Keep it up!

celinediarra
Автор

Great explanation. What happens when the server responds back to the client? Does that mean the return traffic doesn't use the tor network on its way back to the client? If it does how does the encryption of traffic takes place and determination of which nodes will participate will be decided.

moazzamkhan
Автор

Nice explanation Sunny. But what happen with the data that Is no encrypted at the exit node?. Could this data be compromised?. Thanks.

AtiamJ
Автор

How does the client connect to the Tor Directory? Is that through your normal ISP?

vivideradicator
Автор

i am started to scare. something gonna be happen in the world. maybe it is time for doomsday!! Sunny started to upload video. IT IS END OF THE WORLD!!!

kern
Автор

AI tech has rendered tor useless @ fb I has all softwar crawls sniffers no nodes be safe we need new tech

frizerbee